Mobile Security


09

Jan 2018

The new way using a wireless mouse or keyboard leaves you vulnerable

By Ben Goodman You are sitting in your favorite coffee shop with your laptop. You’ve never been a fan of the laptop’s touch pad so you plug in the USB dongle for your favorite wireless mouse and begin browsing the internet, checking emails, etc. You stop using your laptop briefly to check your written notes. You notice a sudden flash of a window popping up,...

Read More


21

Sep 2017

Sword & Shield Enterprise Security Aims to Improve Mobile App Security

National cybersecurity firm launches mobile app security assessment service to ensure businesses and entrepreneurs offer and use secure mobile applications KNOXVILLE, Tenn. Sept. 21, 2017 – Sword & Shield Enterprise Security, a leading national cybersecurity firm based in Knoxville, Tennessee, now offers detailed mobile application security assessments for Android, iOS, and Windows phone or tablet-based apps to determine their vulnerabilities and how sensitive information can...

Read More


15

Oct 2015

Simple Mobile Technology Security Advice

Follow our simple mobile technology security advice for staying protected while always connected. When people spend an average of 162 minutes a day on their mobile phones, staying protected while you’re always connected can become a daunting task. It’s important to understand mobile technology security in order to protect your personal and professional data. Hackers can use the websites you visit, can email phishing attacks to...

Read More


16

Jul 2015

Remember Mobile Devices Security when Implementing your Network Plan

Do you remember the days when business was conducted without a cell phone, tablet or other mobile gadget? Mobile devices security was the last thing on companies’ minds. What once was deemed a mere status symbol of convenience is now the preferred way to keep in touch with customers and access business-sensitive data. Today, employees expect access to company resources. But allowing employees to use their personal...

Read More


09

Jul 2015

Don’t Let Your Laptop Give up Your Patients’ PHI – Security is More than Encryption

As more physicians, nurses and other healthcare workers rely on their smartphones, laptops and tablets to perform their duties and access instant information, the risk of becoming a target for cyber thieves increases. But understanding best practices for securing your company’s mobile devices and employing them should allow you to stay HIPAA compliant while keeping your patients’ personal information secure. Many healthcare organizations are unsure about...

Read More


29

Apr 2015

Have I Been Hacked?

After working in digital forensics for more than eight years, it is common to receive a call from a potential client that thinks they have been “hacked.” After a few minutes of conversation, my finely tuned “paranoid client” meter quickly becomes active. If it reaches my predetermined threshold, I try to systematically walk through the technical aspects required for this to be realistic and provide...

Read More


30

Jan 2015

Three Things to Know About Modern Mobile Forensics

When digital forensics started many years ago, the computer was “king” for the valuable information we sought for our clients. Times have definitely changed over the past few years. While computers still provide great value in our investigations, mobile devices such as tablets and smart phones are now becoming a valuable asset in many cases. We are finding that mobile devices are proving to be a...

Read More